Reselling services represent a significant – and growing – part of the business for many IT consultants. Margins on IT hardware, and to a lesser extent, software, have fallen steadily. The fees that can be charged for higher-value work, such as code customisation and application testing, have also come under pressure, not least because of competition from suppliers in markets such as India or Eastern Europe and Russia.
Simplification is the most important thing when designing a backup system. Look for software that runs across all the operating systems you are backing up and that has the right agents and plug-ins for the applications your customer uses.
Spam isn’t just annoying - it’s a security risk and a prime source of malware and phishing attacks. The new version of Exchange has more effective tools to keep it at bay. Configure the anti-spam tools in Exchange 2007 with our step-by-step guide.
In which a bit of fluff yields up its terrible secret!
Ethel works in Admin. I generally see her at 11 o’clock in the morning and half-past three in the afternoon. We meet by the drinks machine in the foyer of Building C. The machine dispenses a tasteless brown liquid
Virtual Server 2005 R2 SP1 is a good introduction to the world of virtualisation. It’s a free download, and it’ll run on most current hardware — and will support a wide range of legacy and current guest operating systems.
Giving your customers a computing environment that will do exactly what they want is one of the best ways to make them happy, and one of the most effective ways to achieve this is with a combination of Microsoft SharePoint and Office.
TrueCrypt is a free tool to create virtual encrypted disks housed within individual files, or a ‘volume within a volume’ – a hidden operating system and set of files that is invisibly housed in an encrypted file.
Subscribe and get the magazine in the post before it's online
Subscribe and get access to all of the back issues
To read a sample eMagazine - March 2010